Abstract:
Various improvements to steganographic systems, and applications therefore, are disclosed. The improvements include facilitating scale and rotation registration for steganographic decoding by use of rotationally symmetric steganographically embedded patterns and subliminal digital graticules; improved techniques for decoding without access to unencoded originals; improving robustness of steganographic coding in motion pictures and/or in the presence of lossy compression/decompression; and representing data (1690) by patterned bit cells (802) whose energy in the spatial domain facilitates decoding registration (1692). Applications include enhanced-security financial transactions, counterfeit resistant identification cards, fraud deterrent systems for cellular telephony, covert modem channels in video transmissions, photo duplication kiosks with automatic copyright detection, and hotlinked image objects (e.g., with embedded URLs) for use on the Internet.
Abstract:
A method for creating a differential gloss image includes providing first and second anisotropic halftone structures (10,12). The first and second anisotropic structures have different orientations. One of the first and second anisotropic structures is applied to image data in a first region of an image to be halftoned. The other of the first and second anisotropic structures may be applied to image data in a second region of an image to be halftoned. A mixture of the first and second anisotropic structures is applied to image data in a third region of the image to be halftoned, whereby when printed, the three regions each have a gloss characteristic which differs from that of the other two regions.
Abstract:
Techniques for secure distribution of digital representations that combine encryption and watermarking. When a user at a client desires to download a digital representation, the user makes a request to a server for the digital representation, which encrypts the digital representation using a first key and downloads the encrypted digital representation to the user. Before the user performs any operation on the decrypted digital representation, a secret fingerprint watermark identifying the user is added to the digital representation. The fingerprint watermark is added either at the server or at the client and a copy of the fingerprinted digital representation is kept at the server. If the user makes an impermissible use of the digital representation, the secret fingerprint watermark can be used to identify the user. The request made by the user indicates the type of use that the user whished to make of the digital representation. If the use involves storage of the digital representation at the client, the server provides a second key that the client employs to encrypt the digital representation. If the user has permission to do so, the user may modify the digital representation and return the modified digital representation to the server for further distribution. In this case, the second key is used to encrypt the digital representation when it is sent to the server. The second key also serves as the user identification in the fingerprint watermark. If the user loses the second key, it can be recovered from the copy of the fingerprinted digital representation kept at the server. The first and second keys and any decrypted copy of the digital representation are kept in secure storage in the client.
Abstract:
A forensic verification system (900) extracts a print signature via a print signature extractor (910) from a captured image of a printed halftone. The system (900) utilizes a comparator (920) to compare the print signature to a reference signature stored in a registry to determine differences between the print signature and the reference signature. The system (900) utilizes a forensic analyzer (930) to perform a forensic analysis on the signatures based on the comparison to authenticate the printed halftone.
Abstract:
Methods (48, 100, 120) and systems are provided for tracing the source of a printed document (72). A method (48) may include receiving (50) a print job for printing a page having page content (54), generating a log (56) of the print job, encoding (60) the log (56) using a mule image (62) to produce a data-bearing halftone image, merging (64) the data-bearing halftone image with the page content (54), and printing (70) the merged data-bearing halftone image and page content (54) to produce a printed document (72).
Abstract:
The invention relates to a method and system for embedding in a digital media file user fingerprint which the user cannot detect when using the digital media file. In the method, a user-detectable watermark is first embedded in the digital media file. This watermark can be transformed in a client device to a non-detectable fingerprint of the user by utilizing digital media file-specific information issued by a digital media rights owner when the user has bought a user license. Afterwards the digital media rights owner can read the embedded user fingerprint from the digital media file if it is ille¬ gally distributed between other users.
Abstract:
A source electronic device, system and method that is configured to associate a digital image with the source electronic device that generated the digital image is described. The source electronic device (100) comprises a camera (124), a source identification module (130), a processor (112) and a memory module (120). The camera captures at least one unprocessed image. The source identification module identifies the source electronic device with one or more source identification information. The processor processes the captured unprocessed image, and generates a processed digital image. The processed digital image comprises an image header having the source identification information. The memory module stores the processed digital images having the source identification information in the image header. The system comprises a network server and the source electronic device, which further comprises an encryption module configured to encrypt the source identification information. The network server communicates with the source electronic device and assists in decrypting the image header having the encrypted source identification information.
Abstract:
The invention relates to a watermark generation method for generating watermarks to be embedded in digital media, where said watermark is generated by combining at least two watermark patterns from a set of watermark patterns. The set of watermark patterns are divided into at least two subsets of watermark patterns, and the subsets are hierarchically related and the watermark patterns in said watermark are directly related watermark patterns. Directly related means that the watermark patterns are related like parent and child in a hierarchical structure e.g. a tree structure. Further, the invention relates to an apparatus adapted to generate watermarks to be embedded in media.
Abstract:
Techniques for secure distribution of digital representations that combine encryption and watermarking. When a user at a client desires to download a digital representation, the user makes a request to a server for the digital representation, which encrypts the digital representation using a first key and downloads the encrypted digital representation to the user. Before the user performs any operation on the decrypted digital representation, a secret fingerprint watermark identifying the user is added to the digital representation. The fingerprint watermark is added either at the server or at the client and a copy of the fingerprinted digital representation is kept at the server. If the user makes an impermissible use of the digital representation, the secret fingerprint watermark can be used to identify the user. The request made by the user indicates the type of use that the user whished to make of the digital representation. If the use involves storage of the digital representation at the client, the server provides a second key that the client employs to encrypt the digital representation. If the user has permission to do so, the user may modify the digital representation and return the modified digital representation to the server for further distribution. In this case, the second key is used to encrypt the digital representation when it is sent to the server. The second key also serves as the user identification in the fingerprint watermark. If the user loses the second key, it can be recovered from the copy of the fingerprinted digital representation kept at the server. The first and second keys and any decrypted copy of the digital representation are kept in secure storage in the client.
Abstract:
Méthode de sécurisation d'un document original, caractérisée en ce que la méthode comprend les étapes suivantes : - apposer sur le document original et/ou sur un document d'accompagnement distinct du document original des premiers moyens de sécurisation, déterminés en utilisant le contenu du document original, comprenant au moins un contenu codé illisible par un humain et uniquement décodable en utilisant une clef spécifique; - apposer sur le document original et/ou sur le document d'accompagnement des deuxièmes moyens de sécurisation qui se détériorent irrémédiablement lorsque l'on essaye de les retirer et qui sont aptes à stocker des informations et à interagir avec un lecteur sans contact, au moins une partie dudit contenu codé étant imprimé sur au moins une partie des deuxièmes moyens de sécurisation.